00xkhaled / Bella
Bella is a pure python post-exploitation data mining tool & remote administration tool for macOS. ππ»
β190Updated 2 years ago
Alternatives and similar repositories for Bella:
Users that are interested in Bella are comparing it to the libraries listed below
- Armor is a simple Bash script designed to create encrypted macOS payloads capable of evading antivirus scanners.β280Updated last year
- Office for Mac Macro Payload Generatorβ235Updated 7 years ago
- macOS Client-Side Phishing lock screen payloadβ127Updated 5 years ago
- A tool to generate obfuscated one liners to aid in penetration testingβ177Updated 5 years ago
- Collect information about email addresses from Pastebinβ35Updated 3 years ago
- Excalibur is an Eternalblue exploit payload based "Powershell" for the Bashbunny project.β134Updated 5 years ago
- Parser for data dumps Collection #1 / Collection #2-5β144Updated 5 years ago
- Simple python backdoor with Ngrok tunnel supportβ200Updated last year
- Fast and easy create backdoor office exploitation using module metasploit packet , Microsoft Office , Open Office , Macro attack , Bufferβ¦β435Updated 7 years ago
- mosquito - Automating reconnaissance and brute force attacksβ129Updated 5 years ago
- just for fun Β―\_(γ)_/Β―β260Updated 8 years ago
- An internet scanner for exploit CVE-2017-0144 (Eternal Blue) & CVE-2017-0145 (Eternal Romance)β326Updated 5 months ago
- IP obfuscator made to make a malicious ip a bit cuterβ542Updated 3 months ago
- macOS Privilege Escalation Helperβ138Updated 3 years ago
- FruityC2 is a post-exploitation (and open source) framework based on the deployment of agents on compromised machines. Agents are managedβ¦β206Updated 7 years ago
- A script to help set up an event handler in order to install a persistent backdoor that can be activated by sending a message.β174Updated 4 years ago
- APT34/OILRIG leakβ231Updated 5 years ago
- An automated Wireless RogueAP MITM attack framework.β180Updated 5 years ago
- Meterpreter Paranoid Mode - SSL/TLS connectionsβ283Updated 5 years ago
- Collection of social engineering payloadsβ294Updated 7 years ago
- This tool allows one to recover old RDP (mstsc) session information in the form of broken PNG files. These PNG files allows Red Team membβ¦β212Updated 6 years ago
- PowerShell Empire mod to post-exploit the World!β136Updated 6 years ago
- A fully featured Windows backdoor that uses Gmail as a C&C serverβ494Updated 5 years ago
- Turn a normal PDF file into malicious.Use to steal Net-NTLM Hashes from windows machines.β338Updated 3 years ago
- Autoexploitation of some of the most common vulnerabilities in wildβ123Updated 6 years ago
- Collection of Remote Administration Tool samplesβ248Updated 9 years ago